Firstly I want to say the site is beautiful and simple, congratulations.
Also I think you've got a great setup here, I really like it. The script seems easy to read so far.
On looking at a few files, like login.php, I noticed this was in there...
$dbh->prepare('SELECT * FROM users WHERE username = "'.$_POST['username'].'" AND password = "'.$password.'"');
I could be wrong but I would have thought this is actually dangerous for SQL injection as someone can put anything they like into $_POST['username'] bit since it's in the statement area of the prepare bit?
I have to admit, I haven't checked if $dbh is actually your own custom rolled mysqli object but even it if was it still seems dangerous. I.e. I use '?' and bind parameters to prevent this issue... not a major issue at all given people would need to know the trading bot server to attack in the first place but if you decided to release it as a paid-for-service I expect this needs changing to keep users safe.
Making it open source is a great idea too, I can see people wanting to include things like SMS alerts and other exchanges for you.
Thank you for comment. Users install it to their server. So it can be close system.
But i am open for suggestions for SQL injection